The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Every DDoS Resilience and Response Playbook Should Include These Things
Feb 02, 2023
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Security Monitoring
Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools & technologies.
Companies Struggle With Zero Trust as Attackers Adapt to Get Around It
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
January 26, 2023
Only one in 10 enterprises will create a robust zero-trust foundation in the next three years, while more than half of attacks won't even be prevented by it, according to Gartner.
by Robert Lemos, Contributing Writer, Dark Reading
January 26, 2023
4 MIN READ
Article
FBI: Criminals Using BEC Attacks to Scavenge Food Shipments
Cybercriminal rats are at play: Several food suppliers and distributors have experienced hundreds of thousands of dollars in losses after fulfilling fraudulently placed orders for food and ingredient shipments.
December 16, 2022
Cybercriminal rats are at play: Several food suppliers and distributors have experienced hundreds of thousands of dollars in losses after fulfilling fraudulently placed orders for food and ingredient shipments.
by Jai Vijayan, Contributing Writer, Dark Reading
December 16, 2022
4 MIN READ
Article
SOC Turns to Homegrown Machine Learning to Catch Cyber Intruders
A do-it-yourself machine learning system helped a French bank detect three types of exfiltration attacks missed by current rules-based systems, attendees will learn at Black Hat Europe.
December 02, 2022
A do-it-yourself machine learning system helped a French bank detect three types of exfiltration attacks missed by current rules-based systems, attendees will learn at Black Hat Europe.
by Robert Lemos, Contributing Writer, Dark Reading
December 02, 2022
4 MIN READ
Article
Investors Are Pouring Cash Into These 10 Cybersecurity Startups
Following the dollars reveals pen-test and intrusion-detection startups are the most attractive to investors right now, collectively getting more than $3 billion in funding.
November 21, 2022
Following the dollars reveals pen-test and intrusion-detection startups are the most attractive to investors right now, collectively getting more than $3 billion in funding.
by Dark Reading Staff, Dark Reading
November 21, 2022
1 MIN READ
Article
MITRE Engenuity Launches Evaluations for Security Service Providers
The results are labor-intensive to parse, so knowing how to interpret them is key, security experts say.
November 16, 2022
The results are labor-intensive to parse, so knowing how to interpret them is key, security experts say.
by Jai Vijayan, Contributing Writer, Dark Reading
November 16, 2022
6 MIN READ
Article
Amazon, Microsoft Cloud Leaks Highlight Lingering Misconfiguration Issues
Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
November 10, 2022
Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.
by Robert Lemos, Contributing Writer, Dark Reading
November 10, 2022
4 MIN READ
Article
Confidence in Data Recovery Tools Low
IT practitioners are developing ransomware response plans, but many of them are not confident in their data resiliency tools.
November 09, 2022
IT practitioners are developing ransomware response plans, but many of them are not confident in their data resiliency tools.
by Dark Reading Staff, Dark Reading
November 09, 2022
2 MIN READ
Article
Unencrypted Traffic Still Undermining Wi-Fi Security
An analysis by RSA Conference's security operations center found 20% of data over its network was unencrypted and more than 55,000 passwords were sent in the clear.
November 07, 2022
An analysis by RSA Conference's security operations center found 20% of data over its network was unencrypted and more than 55,000 passwords were sent in the clear.
by Robert Lemos, Contributing Writer, Dark Reading
November 07, 2022
4 MIN READ
Article
Zscaler's Cloud-Based Cybersecurity Outages Showcase Redundancy Problem
While fewer cloud providers are suffering outages, customers should prepare for the uncommon event, especially when relying on cloud services for security.
October 31, 2022
While fewer cloud providers are suffering outages, customers should prepare for the uncommon event, especially when relying on cloud services for security.
by Robert Lemos, Contributing Writer, Dark Reading
October 31, 2022
4 MIN READ
Article
Threat Groups Repurpose Banking Trojans into Backdoors
Ursnif, a one-time banking Trojan also known as Gozi, becomes the latest codebase to be repurposed as a more general backdoor, as malware developers trend toward modularity.
October 25, 2022
Ursnif, a one-time banking Trojan also known as Gozi, becomes the latest codebase to be repurposed as a more general backdoor, as malware developers trend toward modularity.
by Robert Lemos, Contributing Writer, Dark Reading
October 25, 2022
5 MIN READ
Article
Care and Feeding of the SOC's Most Powerful Tool: Your Brain
Once overloaded, our brains can't process information effectively, performance decreases, and even the simplest of tasks seem foreign.
October 14, 2022
Once overloaded, our brains can't process information effectively, performance decreases, and even the simplest of tasks seem foreign.
by Danika Nilson, Cyber Threat Hunter, Forescout Frontline, Forescout
October 14, 2022
4 MIN READ
Article
7 Metrics to Measure the Effectiveness of Your Security Operations
SOC metrics will allow stakeholders to track the current state of a program and how it's supporting business objectives.
September 27, 2022
SOC metrics will allow stakeholders to track the current state of a program and how it's supporting business objectives.
by Andrew Hollister, CSO, LogRhythm; VP, LogRhythm Labs
September 27, 2022
4 MIN READ
Article
OpenText Goes All-in on Cybersecurity Size and Scale With Micro Focus Purchase
OpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.
August 31, 2022
OpenText makes a $6 billion bet that bigger is better in security and that cybersecurity platform plays are the future.
by Curtis Franklin, Senior Analyst, Omdia
August 31, 2022
3 MIN READ
Article
New Cross-Industry Group Launches Open Cybersecurity Framework
Eighteen companies, led by Amazon and Splunk, announced the OCSF framework to provide a standard way for sharing threat detection telemetry among different monitoring tools and applications.
August 11, 2022
Eighteen companies, led by Amazon and Splunk, announced the OCSF framework to provide a standard way for sharing threat detection telemetry among different monitoring tools and applications.
by Jeffrey Schwartz, Contributing Writer
August 11, 2022
4 MIN READ
Article
Deepfakes Grow in Sophistication, Cyberattacks Rise Following Ukraine War
A rising tide of threats — from API exploits to deepfakes to extortionary ransomware attacks — is threatening to overwhelm IT security teams.
August 08, 2022
A rising tide of threats — from API exploits to deepfakes to extortionary ransomware attacks — is threatening to overwhelm IT security teams.
by Nathan Eddy, Contributing Writer, Dark Reading
August 08, 2022
3 MIN READ
Article